Protecting Mobile Apps (Cars)

Description

Whenever new news comes out, it's imperative to analyze the actual attack vector and, if it's applicable to our environment, threat model. This analysis is the first step in avoiding hype and FUD. For this week's example? Android attacks on car mobile apps as presented at RSAC.